Skip to content

Commit

Permalink
Update docs/docs/adrs/adr-005-cryptographic-equivocation-verification.md
Browse files Browse the repository at this point in the history
Co-authored-by: Marius Poke <[email protected]>
  • Loading branch information
sainoe and mpoke authored Aug 3, 2023
1 parent f60110f commit 41015ec
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ from the last trusted header validators. The latter is the default method, as it
Additionally, light clients are cross-checking new headers obtained from a primary with witnesses to ensure all nodes share the same state.

A light client attack occurs when a Byzantine validator sends invalid headers to a light client.
As the light client doesn't execute transactions, it can be deceived into trusting corrupted application states.
As the light client doesn't execute transactions, it can be deceived into trusting corrupted application state transitions.
For instance, if a light client receives header A from the primary and header `B` from the witness for the same block height `H`,
and both headers are successfully verified, it indicates a light client attack.
Note that it this case, either the primary and/or witness nodes are malicious.
Expand Down

0 comments on commit 41015ec

Please sign in to comment.